Entry Basin:2014:KYE from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Basin:2014:KYE,
author = "David Basin and Cas Cremers",
title = "Know Your Enemy: Compromising Adversaries in Protocol
Analysis",
journal = j-TISSEC,
volume = "17",
number = "2",
pages = "7:1--7:??",
month = nov,
year = "2014",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2658996",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Wed Nov 19 12:26:42 MST 2014",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "We present a symbolic framework, based on a modular
operational semantics, for formalizing different
notions of compromise relevant for the design and
analysis of cryptographic protocols. The framework's
rules can be combined to specify different adversary
capabilities, capturing different practically-relevant
notions of key and state compromise. The resulting
adversary models generalize the models currently used
in different domains, such as security models for
authenticated key exchange. We extend an existing
security-protocol analysis tool, Scyther, with our
adversary models. This extension systematically
supports notions such as weak perfect forward secrecy,
key compromise impersonation, and adversaries capable
of state-reveal queries. Furthermore, we introduce the
concept of a protocol-security hierarchy, which
classifies the relative strength of protocols against
different adversaries. In case studies, we use Scyther
to analyse protocols and automatically construct
protocol-security hierarchies in the context of our
adversary models. Our analysis confirms known results
and uncovers new attacks. Additionally, our hierarchies
refine and correct relationships between protocols
previously reported in the cryptographic literature.",
acknowledgement = ack-nhfb,
articleno = "7",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- additionally,
13(4)34,
13(4)37,
15(4)15
- adversary,
10(4)6,
11(3)13,
11(4)19,
11(4)23,
13(3)21,
14(4)28,
15(2)9,
15(3)12,
15(3)14,
17(3)9,
17(3)11,
18(1)4,
18(2)5,
18(4)14
- against,
2(3)230,
2(4)354,
2(4)416,
9(4)461,
10(3)11,
11(2)3,
11(3)13,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)7,
14(1)13,
14(3)24,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)1,
16(1)2,
16(2)8,
16(4)13,
17(1)4,
17(2)8,
18(1)2,
18(2)7
- analyse,
12(2)13,
13(3)26,
16(4)17,
17(4)16
- analysis,
1(1)66,
2(1)34,
2(2)138,
2(3)230,
2(3)332,
4(1)1,
6(4)443,
7(2)175,
7(4)489,
8(3)312,
9(3)292,
9(4)391,
10(1)2,
10(3)9,
10(3)10,
10(3)11,
10(4)2,
10(4)6,
11(2)3,
11(3)13,
11(3)15,
11(4)17,
11(4)18,
11(4)23,
12(1)4,
12(2)10,
12(3)16,
13(1)10,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)6,
14(1)8,
14(1)13,
14(2)15,
14(4)28,
15(3)14,
15(4)17,
15(4)18,
16(1)2,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(1)1,
17(1)4,
17(3)9,
17(4)14,
18(1)1,
18(1)4,
18(2)6
- authenticated,
2(3)230,
6(3)365,
7(2)206,
9(2)181,
10(3)10,
11(2)4,
13(2)17,
13(4)29,
13(4)32,
13(4)33,
14(2)17,
16(4)15,
17(4)15
- automatically,
10(2)8,
12(2)10,
13(3)24,
14(1)2,
15(2)6,
15(4)18,
16(2)5,
16(2)7,
17(4)13,
18(3)9
- based,
1(1)3,
2(1)34,
2(2)177,
2(3)230,
2(3)295,
2(3)332,
3(3)161,
7(2)319,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)6,
11(1)3,
11(2)1,
11(2)4,
11(3)12,
11(3)15,
11(4)17,
11(4)18,
12(1)1,
12(1)4,
12(2)13,
12(3)16,
12(3)17,
12(3)18,
13(3)24,
13(3)27,
13(3)28,
13(4)29,
13(4)30,
13(4)31,
13(4)41,
14(1)3,
14(1)4,
14(1)8,
14(1)9,
14(1)10,
14(4)30,
15(2)6,
15(2)7,
15(3)13,
16(2)8,
16(4)16,
17(1)3,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
17(4)16,
18(1)1,
18(1)4,
18(3)10,
18(3)11,
18(4)14
- Basin, David,
14(2)16,
15(3)13,
15(4)15,
16(1)3
- capability,
10(1)4,
10(4)2,
11(1)3,
11(2)2,
11(3)14,
16(2)7,
16(4)13,
17(3)9,
17(3)10
- capable,
12(2)11,
14(4)29,
17(4)14
- case,
7(2)206,
9(4)391,
10(4)2,
11(3)14,
11(4)19,
11(4)21,
12(1)1,
12(1)5,
12(2)10,
12(4)20,
13(4)32,
13(4)34,
14(1)14,
14(2)18,
14(4)28,
15(1)5,
15(2)7,
15(3)13,
16(1)4,
17(1)1,
18(1)1,
18(1)2,
18(1)4
- combined,
10(4)3,
10(4)5,
13(4)33,
14(2)15,
17(4)16
- compromise,
2(2)159,
2(3)230,
11(4)22,
14(1)7,
14(4)28,
14(4)32,
15(1)5,
15(2)9,
17(3)11,
18(2)5
- compromising,
2(3)269,
10(2)6,
11(3)13,
13(1)8,
15(2)9,
15(3)11,
16(4)17
- concept,
1(1)93,
7(1)97,
8(3)287,
10(1)2,
11(2)4,
11(4)17,
13(4)37,
15(3)13,
16(4)16,
17(1)3,
17(4)14
- construct,
9(2)181,
12(1)3,
12(3)19,
13(4)36,
15(1)2,
17(1)2
- context,
7(3)392,
10(1)2,
10(2)8,
10(3)12,
10(4)2,
11(3)13,
11(3)16,
12(3)18,
12(4)20,
14(1)2,
14(1)4,
15(1)2,
15(2)8,
15(4)16,
17(3)12,
18(3)10
- correct,
10(2)6,
13(3)27,
15(2)10,
15(3)11,
16(1)1
- cryptographic,
2(3)230,
2(4)354,
2(4)390,
2(4)416,
9(2)181,
10(2)6,
10(3)10,
10(4)3,
11(3)12,
12(2)9,
13(1)2,
14(1)10,
14(1)11,
14(1)14,
15(1)3,
15(2)9,
16(1)2,
16(2)6,
17(3)10,
18(1)3
- currently,
13(3)22,
13(3)28
- design,
1(1)66,
2(1)34,
2(1)105,
2(2)138,
2(3)269,
2(4)390,
2(4)416,
10(2)7,
10(3)11,
10(4)1,
11(1)2,
11(2)1,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)11,
12(3)17,
12(4)20,
12(4)22,
13(1)10,
13(4)29,
13(4)32,
14(1)8,
14(3)24,
15(3)13,
16(2)5,
16(2)6,
16(2)8,
16(4)16,
17(1)4,
17(2)8,
17(4)13,
18(1)1,
18(1)3,
18(4)12
- different,
1(1)26,
1(1)93,
2(1)105,
2(2)138,
2(3)269,
10(1)2,
10(1)4,
10(4)4,
12(1)3,
12(3)14,
13(1)10,
13(3)27,
13(3)28,
14(1)4,
14(4)28,
15(1)2,
15(2)7,
15(2)10,
16(1)3,
16(2)7,
16(3)9,
16(4)15,
17(4)14,
18(1)1,
18(3)11
- domain,
2(3)295,
14(1)9,
14(4)31,
16(4)14,
16(4)15,
16(4)17,
17(2)5,
18(2)6,
18(2)8
- exchange,
2(3)230,
9(2)181,
10(3)9,
10(3)10,
11(2)6,
14(4)28,
16(4)15,
18(1)2
- existing,
1(1)93,
11(1)2,
11(3)15,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)3,
12(2)12,
12(3)14,
13(3)27,
13(4)36,
14(1)13,
14(3)25,
14(4)30,
15(1)4,
15(2)9,
15(3)12,
16(2)5,
16(3)10,
16(4)15,
17(1)2,
17(1)4,
17(2)5,
17(4)15,
18(1)1,
18(3)10
- extend,
2(4)354,
2(4)390,
9(4)461,
10(1)2,
11(4)20,
12(1)5,
13(3)24,
14(1)8,
14(3)26,
15(1)4,
16(1)4,
16(2)5,
16(3)9,
16(3)10,
17(2)5,
17(4)15
- extension,
1(1)93,
2(1)105,
10(1)2,
10(3)10,
11(1)4,
12(3)16,
12(3)18,
13(3)21,
16(1)4,
17(1)2
- forward,
11(3)15,
13(1)10,
13(4)29,
14(1)11,
15(2)9,
18(3)10
- framework,
2(3)295,
3(4)227,
6(1)71,
6(3)404,
7(2)175,
8(2)187,
9(2)181,
9(4)391,
10(1)2,
10(3)10,
11(1)3,
11(3)12,
11(4)19,
11(4)20,
12(1)2,
12(1)4,
12(1)5,
12(3)19,
12(4)21,
13(3)24,
13(3)28,
14(1)9,
14(1)11,
14(2)21,
14(4)31,
15(2)10,
15(3)12,
15(3)14,
15(4)17,
16(1)2,
16(3)9,
16(4)15,
16(4)17,
17(1)3,
17(2)5,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
18(1)4,
18(3)10,
18(4)12
- furthermore,
2(3)295,
2(4)390,
10(4)2,
12(1)6,
12(4)20,
13(1)10,
13(3)26,
13(3)28,
13(4)32,
13(4)40,
14(1)4,
15(2)6,
16(1)3,
17(4)16
- generalize,
12(1)1,
13(3)25,
15(4)15,
16(1)3,
16(1)4,
18(4)12
- hierarchy,
10(1)2,
10(4)2,
11(3)15,
12(3)18,
12(4)20,
14(1)4,
15(4)15
- impersonation,
14(4)28
- introduce,
1(1)66,
1(1)93,
2(3)230,
2(4)390,
9(2)162,
10(1)2,
10(1)3,
10(4)2,
11(2)5,
11(3)12,
11(4)17,
12(1)1,
12(1)3,
12(1)5,
12(2)13,
12(3)14,
12(3)15,
12(4)20,
13(3)24,
13(3)27,
13(4)32,
14(1)3,
14(1)12,
15(1)2,
16(2)7,
16(3)9,
16(3)12,
16(4)17,
17(3)9
- know,
10(4)3,
15(3)14
- known,
10(3)11,
10(4)1,
10(4)3,
11(2)1,
11(2)3,
11(2)4,
11(4)20,
13(1)10,
13(3)27,
13(4)33,
14(1)7,
14(3)27,
17(1)2,
18(1)1
- literature,
2(3)269,
9(4)391,
10(2)5,
13(3)27,
14(1)14,
14(4)30,
15(2)7,
17(3)9
- modular,
7(3)363,
9(2)181,
12(4)21,
13(3)21,
15(1)4
- new,
1(1)3,
1(1)93,
2(1)105,
2(2)138,
2(3)295,
9(2)181,
9(4)461,
10(1)3,
10(2)6,
10(4)6,
11(4)17,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(2)15,
13(4)29,
13(4)34,
14(1)4,
14(1)5,
14(1)6,
14(1)13,
14(3)23,
14(3)27,
14(4)30,
15(1)3,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)15,
16(2)5,
16(2)7,
16(3)12,
16(4)16,
16(4)17,
17(1)4,
17(3)10,
17(4)15,
18(1)1,
18(1)2,
18(3)10,
18(3)11
- notion,
1(1)66,
2(1)65,
2(3)230,
9(2)181,
10(1)3,
10(4)2,
12(1)1,
12(1)6,
12(2)8,
12(4)20,
13(3)24,
13(3)27,
13(4)36,
14(1)4,
14(4)30,
16(1)3,
18(2)8,
18(3)10
- operational,
10(3)11
- perfect,
11(4)17
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- previously,
13(3)27,
14(3)27,
15(1)5,
16(3)10,
17(4)14
- query,
9(4)391,
10(1)3,
11(2)5,
12(3)16,
13(3)22,
13(3)28,
13(4)32,
16(3)12,
16(4)14
- refine,
1(1)93,
15(3)13
- relationship,
2(1)3,
2(4)390,
6(1)43,
9(2)162,
9(4)391,
10(4)2,
10(4)3,
12(1)2,
13(4)40,
14(3)24,
14(4)30,
15(4)18
- relative,
10(4)6,
16(2)8,
17(2)8,
18(4)14
- relevant,
10(4)4,
12(1)2,
13(3)24,
15(4)18,
16(1)2
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)2,
16(1)3,
16(2)5,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- resulting,
2(1)34,
10(1)2,
10(4)2,
11(4)20,
15(1)4,
15(1)5,
15(2)10,
15(3)13,
15(4)15,
16(3)10,
16(4)17
- rule,
2(1)65,
10(1)4,
10(4)2,
10(4)4,
10(4)5,
12(1)5,
12(4)21,
14(1)2,
15(2)6,
15(4)18,
16(4)16
- secrecy,
12(1)5,
13(4)29,
16(2)6
- semantic,
1(1)93,
10(2)8,
10(4)2,
11(4)21,
12(2)13,
12(3)14,
13(2)12,
13(3)21,
13(4)36,
14(3)25,
15(3)13,
16(1)1,
16(2)7,
17(1)2,
17(1)3
- specify,
9(4)421,
10(2)8,
15(2)6,
17(2)5,
18(2)8
- state,
1(1)93,
2(2)177,
10(2)5,
12(1)4,
12(1)5,
12(2)8,
12(4)20,
13(1)10,
13(3)20,
14(1)6,
14(1)10,
14(1)13,
14(4)32,
16(1)3,
18(1)3,
18(1)4
- strength,
2(3)269,
2(4)416,
10(2)5,
10(4)6,
11(1)2,
11(4)22,
18(1)1,
18(4)13
- study,
2(3)230,
2(4)416,
7(2)206,
10(2)5,
10(4)5,
11(1)3,
11(2)3,
11(4)23,
12(1)6,
12(3)14,
12(4)20,
13(4)40,
14(1)7,
14(2)18,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(2)10,
15(3)13,
17(1)1,
17(3)12,
17(4)14,
18(1)1,
18(1)2,
18(1)4,
18(2)5,
18(2)7,
18(3)9,
18(4)13
- support,
2(2)159,
5(4)492,
6(4)443,
6(4)547,
10(1)2,
10(1)4,
10(2)5,
10(2)7,
10(3)12,
10(4)5,
11(1)3,
11(2)5,
12(1)3,
12(3)14,
12(3)15,
12(4)21,
13(3)24,
13(4)31,
14(1)3,
14(1)11,
14(1)12,
14(4)29,
15(2)9,
15(3)13,
17(2)5,
17(4)15,
18(2)8,
18(3)11
- symbolic,
12(2)10,
14(2)15,
14(4)32,
15(1)3
- systematically,
17(1)4
- tool,
1(1)66,
2(3)332,
2(4)390,
7(2)274,
9(2)181,
10(4)2,
12(2)10,
13(3)24,
13(3)26,
13(4)30,
13(4)40,
14(1)6,
15(1)3,
15(4)18,
16(1)4,
16(2)7,
18(1)1,
18(1)4
- uncover,
12(2)11
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- used,
1(1)3,
2(1)65,
2(4)416,
7(2)319,
9(2)181,
10(1)2,
10(2)5,
10(2)7,
10(2)8,
10(4)2,
11(1)2,
11(1)3,
11(2)3,
11(3)14,
11(3)15,
11(3)16,
11(4)21,
11(4)22,
12(2)8,
12(3)15,
13(1)10,
13(3)22,
13(3)25,
13(4)29,
13(4)34,
14(1)3,
14(1)12,
14(1)13,
14(3)27,
15(1)3,
15(1)5,
15(3)12,
15(4)17,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
17(1)1,
17(3)9,
17(4)13,
18(1)3,
18(2)5,
18(2)6,
18(3)9,
18(4)13,
18(4)14
- weak,
1(1)3,
2(3)230,
2(4)390,
10(4)5,
15(4)16,
16(4)17,
18(1)1